Job Title: Senior Applications – Cybersecurity Architectures
Location of role: Skokie , IL 60076 – Currently remote – Need to live in the Chicago land area possibly Milwaukee or Northern Indiana area and be able to get to Skokie, IL area ( off highway)- May have to go in on a weekend or possibly once a month. Role may go more onsite down the road. Not sure of the timeline. Need to be vaccinated.
Salary or Hourly range: $135,000 Depending on experience DOE
Company relocation – At this time, client will NOT relocate for this role
Company sponsorship – At this time, client will NOT sponsor for this role
Travel: This role may require 0% travel
Duration of role: Direct hire Role – Fulltime
Key Points of the role:
CISSP or other, equivalent security-relevant professional certification is required.
Microsoft Azure Security Technologies (AZ-500) Certification is preferred.
Minimum of a Bachelor’s degree is required.
Minimum of 8 years supporting and developing security for information systems and applications.
Minimum of 4 years of experience in security architecture and design.
Expert understanding of incident management and vulnerability remediation.
Excellent technical investigating and problem solving skills.
Ability to work alone and in a team setting.
Good verbal and written communication skills with a strong customer service orientation.
Knowledge of healthcare applications, trends and industry standards a plus.
Familiarity with cybersecurity industry standard frameworks such as NIST CSF, ISO, and CSA.
Experience with the design and deployment of Microsoft Azure security packages such as EOP, Defender, AIP, and Sentinel.
Job Description Details:
We are currently seeking a Senior Applications Cybersecurity Architectures position on the Cybersecurity Team.
In this role, you will:
Serve as a cybersecurity expert and liaison to technical and operational leadership, helping to drive and coordinate cybersecurity integration and controls in the development and implementation of new services and technologies.
Serve as a security subject matter expert for security architecture, asset management, configuration management, identity management, and related domains, including helping to mature security practices and capabilities with respect to technology projects, vendor and outsourcing arrangements, clinical and non-clinical applications, and medical equipment.
Use threat analysis to identify opportunities to improve cyber defenses. Identify opportunities for greater integration and automation of security operations and monitoring capabilities.
Use automated tools to identify risks and vulnerabilities in networks, interconnected systems, and applications; interpreting the results; and communicating and managing remediation action plans with technical and operational contacts.
Evaluate and understand and assist in communicating the benefits of complex and cutting-edge security and cybersecurity technologies to facilitate integration and augmentation of current systems and affect defense-in-depth strategies.
Facilitate and lead incident triage and emerging risk protocols as well as coordinate incident management functions and root-cause analysis.
Contribute to organization IT and security risk assessments, assisting with automation of measurement and reporting.
Mentor team members and provide educational sessions to improve cybersecurity operations workflows, incident investigative techniques, and system hardening design.
Additionally:
Support and maintain security systems, applications, and capabilities such as data loss prevention (DLP), log and event correlation (SIEM), intrusion detection/prevention (IDS/IPS), web application firewalls (WAF), anti-virus and anti-malware, web and spam filters, and vulnerability assessment (DAST/SAST).
Evaluate organizational cyber resilience and inform the cybersecurity strategy and posture.
Define and develop risk-based cybersecurity and information security reference constructs and standards for the enterprise.
Install and manage enterprise security applications and tools.
Make recommendations for policy changes pertaining to cybersecurity and information security to support continued cybersecurity maturation.
Complete appropriate security documentation to comply with policies and meet internal and external auditor’s expectations.
Promote the goals, expectations, and policies of the department and organization.
this position requires the sharing of on call support with other members of the cybersecurity team. At times, this may require resolving production problems or investigating incidents during off hours such as nights, weekends and holidays.
#INDPMA
If applying for this role – Please take each key point and provide number of years experience and what you would rate yourself, 1 thru 10 (10 being expert) for each key point. Send your resume and notes on the role to expediate our recruiting services.